<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Johan Sydseter</title>
    <description>The latest articles on DEV Community by Johan Sydseter (@sydseter).</description>
    <link>https://dev.to/sydseter</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1603787%2F2452403e-ca52-4d25-94f2-1170d6598a26.png</url>
      <title>DEV Community: Johan Sydseter</title>
      <link>https://dev.to/sydseter</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sydseter"/>
    <language>en</language>
    <item>
      <title>The Cornucopia of Gamified Threat Modeling</title>
      <dc:creator>Johan Sydseter</dc:creator>
      <pubDate>Tue, 24 Mar 2026 09:55:15 +0000</pubDate>
      <link>https://dev.to/owasp/the-cornucopia-of-gamified-threat-modeling-1c9k</link>
      <guid>https://dev.to/owasp/the-cornucopia-of-gamified-threat-modeling-1c9k</guid>
      <description>&lt;p&gt;&lt;strong&gt;At the OWASP Cornucopia project, we are done with updating the cards and help pages for the Website App Edition v3.0: &lt;a href="https://cornucopia.owasp.org/edition/webapp/VE2/3.0" rel="noopener noreferrer"&gt;https://cornucopia.owasp.org/edition/webapp/VE2/3.0&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We would like to thank everyone who contributed to the translations for the new version of the card game and welcome you to review the text on the help pages themselves. Are there inconsistencies? Is there something you feel should be added or removed? If you find anything, please don't hesitate to contact us or raise an issue. Each page includes a "View source on GitHub" button that lets you quickly edit the text if you aren't pleased with it. All viewpoints and critiques are welcome as we are trying to create a home for gamified threat modelling.&lt;/p&gt;

&lt;p&gt;The new Website App Edition v3.0, available in 10 languages (EN, ES, FR, HI, NL, NO-NB, PT-PT,  PT-BR, RU, UK), connects 202 CAPECs individually to a set of ASVS 5.0 requirements in relation to each of the cards. This means, even though you only have 80 cards, the website describes an exponential number of possible threats, making it the Cornucopia of website app threats. There is simply no end to the possibilities that your thoughts can take you while playing the game, yes, that's the Cornucopia way.&lt;br&gt;
But what if you want to focus on a specific CAPEC and find the related OWASP ASVS requirements? &lt;br&gt;
Go to a card, click on the CAPEC in the CAPEC map, and it will give you all the possible OWASP ASVS combinations, thereby connecting attack patterns and security requirements, making a thorough and deep website security requirement analysis possible while discussing a specific card. You can literally spend weeks analysing, playing, deciding for yourself "What can go wrong?", "What to do about it?", and even form yourself an opinion on whether you really did a good job (see: &lt;a href="https://github.com/adamshostack/4QuestionFrame" rel="noopener noreferrer"&gt;Shostack's Four Question Frame for Threat Modeling&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;Have we stopped there? Now we haven't! For each card, you also have the "OWASP Cheat Sheet Series Index". What is that? The "OWASP Cheat Sheet Series Index" is an OWASP index that connects each of the ASVS requirements with a set of OWASP Cheat Sheets that will give you advice on how to implement the specific OWASP ASVS requirement! Want to know how to do log protection according to "OWASP ASVS V16.4 - Log Protection"? No problem! The "OWASP ASVS (5.0) Cheat Sheet Series Index" displayed on the help pages for each card will take you to the collection of OWASP Cheat Sheets that is related to the requirement you are wondering about.&lt;/p&gt;

&lt;p&gt;But there is even more! What about STRIDE? What about Threat Modeling? Each card has a &lt;a href="https://cornucopia.owasp.org/edition/webapp/VE2/3.0#STRIDE" rel="noopener noreferrer"&gt;STRIDE section&lt;/a&gt;, a &lt;a href="https://cornucopia.owasp.org/edition/webapp/VE2/3.0#What-can-go-wrong?" rel="noopener noreferrer"&gt;"What can go wrong?"&lt;/a&gt; section and a &lt;a href="https://cornucopia.owasp.org/edition/webapp/VE2/3.0#What-are-we-going-to-do-about-it?" rel="noopener noreferrer"&gt;"What are we going to do about it?"&lt;/a&gt; section. &lt;/p&gt;

&lt;p&gt;This means that during your threat modeling, if you have questions about &lt;a href="https://cornucopia.owasp.org/edition/webapp/VE2/3.0#What-can-go-wrong?" rel="noopener noreferrer"&gt;"What can go wrong?"&lt;/a&gt; or &lt;a href="https://cornucopia.owasp.org/edition/webapp/VE2/3.0#What-are-we-going-to-do-about-it?" rel="noopener noreferrer"&gt;"What are we going to do about it?"&lt;/a&gt; Just go to the individual card pages, and you will find what you are looking for!&lt;/p&gt;

&lt;p&gt;Now, you may be asking yourself, "That's it, right? No, it isn't, we have even moooooooore! &lt;/p&gt;
&lt;h2&gt;
  
  
  Threat Dragon and EoP Games
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1ry2rze9wnftocimdkyo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1ry2rze9wnftocimdkyo.png" alt="Threat Dragon and EoP Games"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When choosing a tool for publishing our threat model, we chose &lt;a href="https://www.threatdragon.com/#/" rel="noopener noreferrer"&gt;OWASP Threat Dragon&lt;/a&gt;. OWASP Threat Dragon is a free, open-source, cross-platform threat modeling application. It is used to create threat modeling diagrams and list threats for elements within the diagrams. Mike Goodwin created Threat Dragon as an open-source community project that provides an intuitive, accessible way to model threats.&lt;/p&gt;

&lt;p&gt;OWASP Threat Dragon has released this possibility in v2.6. This is just the start of integration between the two projects.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl25mz5xxzbt0a8t5627g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl25mz5xxzbt0a8t5627g.png" alt="How to choose to create a OWASP Cornucopia threat model"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thanks to Gerardo Canedo and his students at Universidad Católica del Uruguay, it's now possible to create your OWASP Cornucopia Threat Model directly in OWASP Threat Dragon. When creating a new diagram for your threat model, simply choose to create an EoP Games diagram. We chose to call the diagram EoP Games for two reasons. One, OWASP Cornucopia is derived from the &lt;a href="https://shostack.org/games/elevation-of-privilege" rel="noopener noreferrer"&gt;Elevation of Privilege game&lt;/a&gt; created by Adam Shostack. Two, we don't want to stop with OWASP Cornucopia. We also want to add other EoP games, such as the original EoP Game.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1zl30hc63fie1wg6y7e3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1zl30hc63fie1wg6y7e3.png" alt="Create a OWASP Cornucopia threat"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Once you have created an EoP Games diagram, you can add OWASP Cornucopia threats to your threat model. The specific threat you add will get a link reference to the &lt;a href="https://cornucopia.owasp.org/edition/webapp/AT3/2.2/en#Threat-Modeling" rel="noopener noreferrer"&gt;OWASP Cornucopia website&lt;/a&gt;, where you will find guidance on threat modeling and STRIDE, which will help you in identifying what can go wrong and what to do about it. You can also find a &lt;a href="https://cornucopia.owasp.org/edition/webapp/AT3/2.2/en#What-are-we-going-to-do-about-it?" rel="noopener noreferrer"&gt;complete mapping&lt;/a&gt; to &lt;a href="https://cornucopia.owasp.org/taxonomy/asvs-4.0.3/02-authentication/05-credential-recovery#V2.5.2" rel="noopener noreferrer"&gt;OWASP ASVS&lt;/a&gt;, &lt;a href="https://devguide.owasp.org/en/04-design/02-web-app-checklist/06-digital-identity/#1-authentication-a" rel="noopener noreferrer"&gt;OWASP Developer Guide&lt;/a&gt;, and all &lt;a href="https://cornucopia.owasp.org/taxonomy/capec-3.9" rel="noopener noreferrer"&gt;relevant CAPECs&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9mvjvggcpwkh58fix1bc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9mvjvggcpwkh58fix1bc.png" alt="OWASP Corncupia Website"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I want to express my sincere appreciation to Gerardo Canedo, Sebastian Feirres, and their students at Universidad Católica del Uruguay for making this possible. With their dedication and effort, OWASP Cornucopia wouldn’t have had this possibility.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faabcyoarlrl9ogkvw601.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faabcyoarlrl9ogkvw601.JPG" alt="Gerardo Canedo and his students at Universidad Católica del Uruguay"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  Shostack's 4 Question Frame for Threat Modeling
&lt;/h2&gt;

&lt;p&gt;OWASP Cornucopia, together with OWASP Threat Dragon, is helping us in answering:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What we are working on&lt;/li&gt;
&lt;li&gt;What can go wrong?&lt;/li&gt;
&lt;li&gt;What are we going to do about it?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;...but "Did we do a good enough job?"&lt;/p&gt;

&lt;p&gt;At Admincontrol, where I work, we have always sent an anonymous survey after every OWASP Cornucopia threat modeling session. The aggregate score for how satisfied respondents have been with all sessions we've held since we started OWASP Cornucopia in 2023 is 4.5 out of 5. When asked how relevant the session was to the participant's job, the average score was 4.7 out of 5. When asked whether the OWASP Cornucopia session helped the participants understand which security controls (mitigations) they need to implement/test, the score was 4.5. When asked whether the session improved the overall awareness of application security requirements, the score was 4.0. When asked, "Did we do a good job?", the score was 4.3. So for sure, we can do better!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn0iihqk4knhglpi3qo2l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn0iihqk4knhglpi3qo2l.png" alt="Relevant for your job"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When asking the question, "Did we do a good enough job?", don’t just blurt it out during a session. Do you honestly think people will give you their honest criticism to your face directly? Send out an anonymous survey and ask for feedback!&lt;/p&gt;
&lt;h2&gt;
  
  
  How to get those requirements into your issue tracking software
&lt;/h2&gt;

&lt;p&gt;So you have done your threat modeling and security requirement analysis, what comes next? You need to create an issue that the development team can work on, and you need to add it to the development team's sprint. How do you do it? &lt;br&gt;
The OWASP Cornucopia project is creating a &lt;a href="https://cornucopia.owasp.org/api/docs" rel="noopener noreferrer"&gt;requirements API&lt;/a&gt; that lets you harvest the security requirements you want. After you have created your threat model in OWASP Threat Dragon, extract its JSON response, look up the threats you have identified, and find the corresponding security requirements by using the API, merge the results together, and generate your &lt;a href="https://cornucopia.owasp.org/how-to-play#Gameplay---Modelling-evil-user-stories" rel="noopener noreferrer"&gt;evil user stories&lt;/a&gt; by pushing the results to your issue tracking software just in time for the development team's next sprint.&lt;/p&gt;
&lt;h2&gt;
  
  
  How to get OWASP Cornucopia?
&lt;/h2&gt;

&lt;p&gt;The question you might be asking yourself is, "How are we going to be able to utilize these resources and play this game?" No problem! There are various ways you can do that, both online at &lt;a href="http://copi.owasp.org/" rel="noopener noreferrer"&gt;copi.owasp.org&lt;/a&gt; and in person, enjoying the presence of your colleagues, by &lt;a href="https://cybersecgames.com/products/owasp%C2%AE-cornucopia-3-0-website-app-edition-threat-modeling-cards-copy" rel="noopener noreferrer"&gt;buying a deck of cards&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;
  
  
  What is coming next...
&lt;/h2&gt;

&lt;p&gt;But what about DevOps? What about LLM and AI Agents? We are working on that too. The new &lt;a href="https://cornucopia.owasp.org/edition/companion" rel="noopener noreferrer"&gt;OWASP Cornucopia Companion Edition&lt;/a&gt;, that soon will be published, can be used alongside the OWASP Website App Edition and it comes with 6 new companion suits covering new topics: Agentic AI (AAI), Automated Threats (BOT), Cloud (CLD), Frontend (FRE), Large Language Models (LLM), and  DevOps (DVO). A suit in the companion deck may replace (or be used in addition to) suites in the existing Website Edition so that the players can add a specific focus to their threat modeling: For example, say you are building an LLM application and want to perform threat modeling specifically for LLM. You would then use the OWASP Cornucopia Website Edition and the LLM companion suite as your elected OWASP Cornucopia focus area.&lt;/p&gt;

&lt;p&gt;OWASP Cornucopia welcomes any input or improvements you might be willing to share with us. For anyone wanting to share their opinion, please don't hesitate to &lt;a href="https://github.com/OWASP/cornucopia/issues" rel="noopener noreferrer"&gt;visit our repository&lt;/a&gt;, share your feedback, and, if appropriate, give us a star⭐️.&lt;/p&gt;

&lt;p&gt;  &lt;iframe src="https://www.youtube.com/embed/XXTPXozIHow"&gt;
  &lt;/iframe&gt;
&lt;/p&gt;




&lt;p&gt;&lt;a href="https://owasp.org" rel="noopener noreferrer"&gt;OWASP&lt;/a&gt; is a non-profit foundation that envisions a world with no more insecure software. Our mission is to be the global open community that powers secure software through education, tools, and collaboration. We maintain hundreds of open source projects, run industry-leading educational and training conferences, and meet through over 250 chapters worldwide.&lt;/p&gt;

</description>
      <category>appsec</category>
      <category>security</category>
      <category>gamedev</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>OWASP Cornucopia is publishing it’s darkest secrets!</title>
      <dc:creator>Johan Sydseter</dc:creator>
      <pubDate>Mon, 16 Feb 2026 06:39:00 +0000</pubDate>
      <link>https://dev.to/owasp/owasp-cornucopia-is-publishing-its-darkest-secrets-fjc</link>
      <guid>https://dev.to/owasp/owasp-cornucopia-is-publishing-its-darkest-secrets-fjc</guid>
      <description>&lt;p&gt;&lt;strong&gt;Why do we keep our darkest fears secret? Publish them, and bring light to the darkest corners of your web application.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When Adam Schostack + associates last year urged everyone to &lt;a href="https://shostack.org/blog/publish-your-threat-model/" rel="noopener noreferrer"&gt;publish their threat model&lt;/a&gt;, we thought, «What a wonderful idea!»&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fivcsnbnbtq4qs0t4xzc6.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fivcsnbnbtq4qs0t4xzc6.webp" alt="Publish your threat model, at https://shostack.org/blog/publish-your-threat-model/"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So we went ahead and did just that. At cornucopia.owasp.org, you can now &lt;a href="https://cornucopia.owasp.org/copi#Our-Threat-Model" rel="noopener noreferrer"&gt;find the threat model&lt;/a&gt; for the &lt;a href="https://copi.owasp.org/" rel="noopener noreferrer"&gt;OWASP Cornucopia Game Engine, Copi&lt;/a&gt;.&lt;br&gt;
There we have listed all our darkest fears and secrets. Darkness is not a force of its own; it is simply the absence of light. When light is shed on our doubts and fears, making them visible, we find solutions and become stronger. This is why publishing your threat model is essential. If you refuse to disclose your vulnerabilities to anyone, they become liabilities that may one day lead to doubts, lies, and perhaps even conspiracies and litigation. Therefore, before building software, build trust and make it clear what others need to be aware of.&lt;/p&gt;
&lt;h2&gt;
  
  
  Threat Dragon and EoP Games
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1ry2rze9wnftocimdkyo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1ry2rze9wnftocimdkyo.png" alt="Threat Dragon and EoP Games"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When choosing a tool for publishing our threat model, we chose &lt;a href="https://www.threatdragon.com/#/" rel="noopener noreferrer"&gt;OWASP Threat Dragon&lt;/a&gt;. OWASP Threat Dragon is a free, open-source, cross-platform threat modeling application. It is used to create threat modeling diagrams and list threats for elements within the diagrams. Mike Goodwin created Threat Dragon as an open-source community project that provides an intuitive, accessible way to model threats.&lt;/p&gt;

&lt;p&gt;OWASP Threat Dragon will release this possibility in v2.6, which is due to be released in week 9, but already now, you can try it out on their &lt;a href="https://www.threatdragon.com/#/" rel="noopener noreferrer"&gt;demo site&lt;/a&gt;. This is just the start of integration between the two projects; more is to come. OWASP Threat Dragon V2.6 will come out with all sorts of exciting features. For a full list, have a look at their current &lt;a href="https://github.com/OWASP/threat-dragon/issues?q=label%3Aversion-2.6" rel="noopener noreferrer"&gt;v2.6 roadmap&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl25mz5xxzbt0a8t5627g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl25mz5xxzbt0a8t5627g.png" alt="How to choose to create a OWASP Cornucopia threat model"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thanks to Gerardo Canedo and his students at Universidad Católica del Uruguay, it's now possible to create your OWASP Cornucopia Threat Model directly in OWASP Threat Dragon. When creating a new diagram for your threat model, simply choose to create an EoP Games diagram. We chose to call the diagram EoP Games for two reasons. One, OWASP Cornucopia is derived from the &lt;a href="https://shostack.org/games/elevation-of-privilege" rel="noopener noreferrer"&gt;Elevation of Privilege game&lt;/a&gt; created by Adam Shostack. Two, we don't want to stop with OWASP Cornucopia. We also want to add other EoP games, such as the original EoP Game.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1zl30hc63fie1wg6y7e3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1zl30hc63fie1wg6y7e3.png" alt="Create a OWASP Cornucopia threat"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Once you have created an EoP Games diagram, you can add OWASP Cornucopia threats to your threat model. The specific threat you add will get a link reference to the &lt;a href="https://cornucopia.owasp.org/edition/webapp/AT3/2.2/en#Threat-Modeling" rel="noopener noreferrer"&gt;OWASP Cornucopia website&lt;/a&gt;, where you will find guidance on threat modeling and STRIDE, which will help you in identifying what can go wrong and what to do about it. You can also find a &lt;a href="https://cornucopia.owasp.org/edition/webapp/AT3/2.2/en#What-are-we-going-to-do-about-it?" rel="noopener noreferrer"&gt;complete mapping&lt;/a&gt; to &lt;a href="https://cornucopia.owasp.org/taxonomy/asvs-4.0.3/02-authentication/05-credential-recovery#V2.5.2" rel="noopener noreferrer"&gt;OWASP ASVS&lt;/a&gt;, &lt;a href="https://devguide.owasp.org/en/04-design/02-web-app-checklist/06-digital-identity/#1-authentication-a" rel="noopener noreferrer"&gt;OWASP Developer Guide&lt;/a&gt;, and all &lt;a href="https://cornucopia.owasp.org/taxonomy/capec-3.9" rel="noopener noreferrer"&gt;relevant CAPECs&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9mvjvggcpwkh58fix1bc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9mvjvggcpwkh58fix1bc.png" alt="OWASP Corncupia Website"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I want to express my sincere appreciation to Gerardo Canedo, Sebastian Feirres, and their students at Universidad Católica del Uruguay for making this possible. With their dedication and effort, OWASP Cornucopia wouldn’t have had this possibility.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faabcyoarlrl9ogkvw601.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faabcyoarlrl9ogkvw601.JPG" alt="Gerardo Canedo and his students at Universidad Católica del Uruguay"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  Shostack's 4 Question Frame for Threat Modeling
&lt;/h2&gt;

&lt;p&gt;OWASP Cornucopia, together with OWASP Threat Dragon, is helping us in answering:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What we are working on&lt;/li&gt;
&lt;li&gt;What can go wrong?&lt;/li&gt;
&lt;li&gt;What are we going to do about it?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;...but "Did we do a good enough job?"&lt;/p&gt;

&lt;p&gt;At Admincontrol, where I work, we have always sent an anonymous survey after every OWASP Cornucopia threat modeling session. The aggregate score for how satisfied respondents have been with all sessions we've held since we started OWASP Cornucopia in 2023 is 4.5 out of 5. When asked how relevant the session was to the participant's job, the average score was 4.7 out of 5. When asked whether the OWASP Cornucopia session helped the participants understand which security controls (mitigations) they need to implement/test, the score was 4.5. When asked whether the session improved the overall awareness of application security requirements, the score was 4.0. When asked, "Did we do a good job?", the score was 4.3. So for sure, we can do better!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn0iihqk4knhglpi3qo2l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn0iihqk4knhglpi3qo2l.png" alt="Relevant for your job"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When asking the question, "Did we do a good enough job?", don’t just blurt it out during a session. Do you honestly think people will give you their honest criticism to your face directly? Send out an anonymous survey and ask for feedback!&lt;/p&gt;

&lt;p&gt;OWASP Cornucopia welcomes any input or improvements you might be willing to share with us regarding our current threat model. Arguably, we created the system before we were able to identify all our threats, and several improvements need to be made to properly balance the inherent risks of compromise against the current security controls. For anyone hosting the game engine, please take this into account. For anyone wanting to share their opinion, please don't hesitate to &lt;a href="https://github.com/OWASP/cornucopia/issues" rel="noopener noreferrer"&gt;visit our repository&lt;/a&gt;, share your feedback, and, if appropriate, give us a star⭐️.&lt;/p&gt;

&lt;p&gt;

  &lt;iframe src="https://www.youtube.com/embed/XXTPXozIHow"&gt;
  &lt;/iframe&gt;


&lt;/p&gt;




&lt;p&gt;&lt;a href="https://owasp.org" rel="noopener noreferrer"&gt;OWASP&lt;/a&gt; is a non-profit foundation that envisions a world with no more insecure software. Our mission is to be the global open community that powers secure software through education, tools, and collaboration. We maintain hundreds of open source projects, run industry-leading educational and training conferences, and meet through over 250 chapters worldwide.&lt;/p&gt;

</description>
      <category>security</category>
      <category>appsec</category>
      <category>agile</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Are you the next card game designer for OWASP Cornucopia Website Edition v3.0?
Then get in touch with us for fame and glory!</title>
      <dc:creator>Johan Sydseter</dc:creator>
      <pubDate>Thu, 13 Nov 2025 14:38:16 +0000</pubDate>
      <link>https://dev.to/sydseter/are-you-the-next-card-game-designer-for-owasp-cornucopia-website-edition-v30-then-get-in-touch-2em</link>
      <guid>https://dev.to/sydseter/are-you-the-next-card-game-designer-for-owasp-cornucopia-website-edition-v30-then-get-in-touch-2em</guid>
      <description>&lt;p&gt;

&lt;/p&gt;
&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/owasp/owasp-cornucopia-30-a-call-for-card-game-designers-1j1m" class="crayons-story__hidden-navigation-link"&gt;OWASP Cornucopia 3.0 - A call for card game designers!&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;
          &lt;a class="crayons-logo crayons-logo--l" href="/owasp"&gt;
            &lt;img alt="OWASP® Foundation logo" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3468%2F0b3561bb-9ac3-413f-baaa-5014181e4b4d.jpg" class="crayons-logo__image"&gt;
          &lt;/a&gt;

          &lt;a href="/sydseter" class="crayons-avatar  crayons-avatar--s absolute -right-2 -bottom-2 border-solid border-2 border-base-inverted  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1603787%2F2452403e-ca52-4d25-94f2-1170d6598a26.png" alt="sydseter profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/sydseter" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Johan Sydseter
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Johan Sydseter
                
              
              &lt;div id="story-author-preview-content-3019822" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/sydseter" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1603787%2F2452403e-ca52-4d25-94f2-1170d6598a26.png" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Johan Sydseter&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

            &lt;span&gt;
              &lt;span class="crayons-story__tertiary fw-normal"&gt; for &lt;/span&gt;&lt;a href="/owasp" class="crayons-story__secondary fw-medium"&gt;OWASP® Foundation&lt;/a&gt;
            &lt;/span&gt;
          &lt;/div&gt;
          &lt;a href="https://dev.to/owasp/owasp-cornucopia-30-a-call-for-card-game-designers-1j1m" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Nov 13 '25&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/owasp/owasp-cornucopia-30-a-call-for-card-game-designers-1j1m" id="article-link-3019822"&gt;
          OWASP Cornucopia 3.0 - A call for card game designers!
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/gamedev"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;gamedev&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/security"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;security&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/design"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;design&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/webdev"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;webdev&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/owasp/owasp-cornucopia-30-a-call-for-card-game-designers-1j1m" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/multi-unicorn-b44d6f8c23cdd00964192bedc38af3e82463978aa611b4365bd33a0f1f4f3e97.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;1&lt;span class="hidden s:inline"&gt; reaction&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/owasp/owasp-cornucopia-30-a-call-for-card-game-designers-1j1m#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            2 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;




</description>
      <category>gamedev</category>
      <category>security</category>
      <category>design</category>
      <category>webdev</category>
    </item>
    <item>
      <title>OWASP Cornucopia 3.0 - A call for card game designers!</title>
      <dc:creator>Johan Sydseter</dc:creator>
      <pubDate>Thu, 13 Nov 2025 12:24:59 +0000</pubDate>
      <link>https://dev.to/owasp/owasp-cornucopia-30-a-call-for-card-game-designers-1j1m</link>
      <guid>https://dev.to/owasp/owasp-cornucopia-30-a-call-for-card-game-designers-1j1m</guid>
      <description>&lt;h2&gt;
  
  
  &lt;em&gt;Would you like to be our card game designer for the OWASP Cornucopia Website Edition v3.0?&lt;/em&gt;
&lt;/h2&gt;

&lt;p&gt;We are close to releasing the next version of &lt;a href="https://cornucopia.owasp.org/cards" rel="noopener noreferrer"&gt;OWASP Cornucopia Website Edition v3.0&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We wonder whether there are some brilliant designers out there who would like to volunteer to create the motifs for the 80 cards in OWASP's very popular threat modeling card games for website applications?&lt;/p&gt;

&lt;p&gt;OWASP® Cornucopia is a threat modeling tool in the form of a card game to assist software development teams in identifying security requirements in Agile, conventional, and formal development processes. It strives to be language, platform, and technology-agnostic.&lt;/p&gt;

&lt;p&gt;It’s one of the few tools that connects threat modeling with OWASP ASVS, SAFECode, STRIDE, OWASP DevGuide, and CAPEC, helping to identify security requirements, develop a secure design, and create a threat model without prior knowledge of these frameworks. &lt;/p&gt;

&lt;p&gt;We are now creating the next version of the website app game. The new version will feature new cards and text that cover all of the requirements in OWASP ASVS 5.0 and connect these to more than 210 unique common attack patterns (CAPEC).&lt;/p&gt;

&lt;p&gt;The first edition was created in August 2012, released as v1.0 in February 2013, and has undergone several minor updates/releases over the subsequent ten years. This has been substantially updated in today’s release of v3.0, with the most noticeable change being the update of the OWASP ASVS mapping from ASVS v4.0 to v5.0. The card game comes in two physical sizes. The smaller ones are often referred to as “bridge-sized cards” and the larger ones as “Tarot-sized cards”. All these v3.0 files will be immediately available in nine languages (English, Spanish, French, Dutch, Norwegian, Portuguese, Italian, Russian, and Hungarian) due to the efforts of past and current volunteers.&lt;/p&gt;

&lt;p&gt;Don't hesitate to get in touch &lt;a href="https://www.linkedin.com/in/sydseter/" rel="noopener noreferrer"&gt;with us&lt;/a&gt; for fame and glory.&lt;/p&gt;




&lt;p&gt;Uncover the security flaws in your software's design before the bad guys do it for you! Get your team together on a call or in a room and use OWASP Cornucopia Web &amp;amp; Mobile, Elevation of Privilege or Elevation of MLSec and OWASP Cumulus to secure your AI models and Cloud infrastructure respectively and guide your threat modelling at &lt;a href="https://copi.owasp.org" rel="noopener noreferrer"&gt;copi.owasp.org&lt;/a&gt;, and if you visit our &lt;a href="https://github.com/OWASP/cornucopia" rel="noopener noreferrer"&gt;code repository&lt;/a&gt; please give us a star ⭐️.&lt;/p&gt;

&lt;p&gt;

  &lt;iframe src="https://www.youtube.com/embed/XXTPXozIHow"&gt;
  &lt;/iframe&gt;


&lt;/p&gt;




&lt;p&gt;&lt;a href="https://owasp.org" rel="noopener noreferrer"&gt;OWASP&lt;/a&gt; is a non-profit foundation that envisions a world with no more insecure software. Our mission is to be the global open community that powers secure software through education, tools, and collaboration. We maintain hundreds of open source projects, run industry-leading educational and training conferences, and meet through over 250 chapters worldwide.&lt;/p&gt;

</description>
      <category>gamedev</category>
      <category>security</category>
      <category>design</category>
      <category>webdev</category>
    </item>
    <item>
      <title>[Boost]</title>
      <dc:creator>Johan Sydseter</dc:creator>
      <pubDate>Wed, 08 Oct 2025 20:02:20 +0000</pubDate>
      <link>https://dev.to/sydseter/-2onl</link>
      <guid>https://dev.to/sydseter/-2onl</guid>
      <description>&lt;div class="ltag__link"&gt;
  &lt;a href="/owasp" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__org__pic"&gt;
      &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3468%2F0b3561bb-9ac3-413f-baaa-5014181e4b4d.jpg" alt="OWASP® Foundation" width="400" height="400"&gt;
      &lt;div class="ltag__link__user__pic"&gt;
        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1603787%2F2452403e-ca52-4d25-94f2-1170d6598a26.png" alt="" width="400" height="400"&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://dev.to/owasp/how-do-you-get-your-dev-team-to-shift-left-by-themselves-for-real-3eap" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;How do you get your dev team to shift left by themselves for real?&lt;/h2&gt;
      &lt;h3&gt;Johan Sydseter for OWASP® Foundation ・ Oct 3&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#devops&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#security&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#ai&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#gamedev&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


</description>
      <category>devops</category>
      <category>security</category>
      <category>ai</category>
      <category>gamedev</category>
    </item>
    <item>
      <title>Shift-left doesn't start with scanning the code for security vulnerabilities; it begins with designing it. Play yourself secure with OWASP Cornucopia Website Edition v2.2</title>
      <dc:creator>Johan Sydseter</dc:creator>
      <pubDate>Sat, 04 Oct 2025 15:29:03 +0000</pubDate>
      <link>https://dev.to/sydseter/shift-left-doesnt-start-with-scanning-the-code-for-security-vulnerabilities-it-begins-with-3cf8</link>
      <guid>https://dev.to/sydseter/shift-left-doesnt-start-with-scanning-the-code-for-security-vulnerabilities-it-begins-with-3cf8</guid>
      <description>&lt;div class="ltag__link"&gt;
  &lt;a href="/owasp" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__org__pic"&gt;
      &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3468%2F0b3561bb-9ac3-413f-baaa-5014181e4b4d.jpg" alt="OWASP® Foundation" width="400" height="400"&gt;
      &lt;div class="ltag__link__user__pic"&gt;
        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1603787%2F2452403e-ca52-4d25-94f2-1170d6598a26.png" alt="" width="400" height="400"&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://dev.to/owasp/how-do-you-get-your-dev-team-to-shift-left-by-themselves-for-real-3eap" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;How do you get your dev team to shift left by themselves for real?&lt;/h2&gt;
      &lt;h3&gt;johan sydseter for OWASP® Foundation ・ Oct 3&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#devops&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#security&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#ai&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#gamedev&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


</description>
      <category>devops</category>
      <category>security</category>
      <category>ai</category>
      <category>gamedev</category>
    </item>
    <item>
      <title>How do you get your dev team to shift left by themselves for real?</title>
      <dc:creator>Johan Sydseter</dc:creator>
      <pubDate>Fri, 03 Oct 2025 07:12:03 +0000</pubDate>
      <link>https://dev.to/owasp/how-do-you-get-your-dev-team-to-shift-left-by-themselves-for-real-3eap</link>
      <guid>https://dev.to/owasp/how-do-you-get-your-dev-team-to-shift-left-by-themselves-for-real-3eap</guid>
      <description>&lt;h2&gt;
  
  
  &lt;em&gt;Shift-left doesn't start with scanning the code for security vulnerabilities; it begins with designing it. Play yourself secure with OWASP Cornucopia Website Edition v2.2&lt;/em&gt;
&lt;/h2&gt;

&lt;p&gt;Too often the shift-left mantra consists of implementing AI code scanning and applying AI-powered security fixes for remediation. Also, don't forget to implement the &lt;a href="https://engineering.fb.com/2025/04/29/ai-research/autopatchbench-benchmark-ai-powered-security-fixes/" rel="noopener noreferrer"&gt;AI-powered benchmark for AI-Powered Security Fixes&lt;/a&gt;. We're not telling you to stop using these tools, instead, we want to ask ourselves:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What are we working on?&lt;/li&gt;
&lt;li&gt;What can go wrong?&lt;/li&gt;
&lt;li&gt;What are we going to do about it?&lt;/li&gt;
&lt;li&gt;Did we do a good job?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Source: &lt;a href="https://github.com/adamshostack/4QuestionFrame" rel="noopener noreferrer"&gt;Shostack's Four Question Frame for Threat Modeling&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Secure design starts with understanding &lt;strong&gt;what we are working on&lt;/strong&gt;, asking &lt;strong&gt;what can go wrong&lt;/strong&gt; and &lt;strong&gt;what we are going to do about it&lt;/strong&gt;. I'll leave that to the AI-assistants you say?&lt;br&gt;
Before you do, know that the "&lt;a href="https://www.veracode.com/blog/ai-generated-code-security-risks/" rel="noopener noreferrer"&gt;2025 GenAI Code Security Report&lt;/a&gt;" from Veracode shows that after a comprehensive analysis of over 100 large language models across 80 coding tasks spanning four programming languages and four critical vulnerability types, only 55% of AI-generated code was secure (AI-Generated Code: A Double-Edged Sword for Developers, 09.09.2025). We don't doubt that, eventually, the machines will take over the world, but in the mean time, don't forget to ask yourself &lt;strong&gt;what can go wrong&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa3uy09dwzqa4soxv1xfv.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa3uy09dwzqa4soxv1xfv.webp" alt="Machines will for sure take over the world"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And what does the industry standard for infosec management say about writing secure code?&lt;/p&gt;

&lt;p&gt;If you happen to be ISO 27001 certified and are writing code, you should know that the control you have called: "ISO 27002: 8.28 Secure coding", says that: "Planning and prerequisites before coding should include: ... g) secure design and architecture, including threat modelling".&lt;/p&gt;

&lt;p&gt;But, how can you possible do that in an agile and fun way?&lt;/p&gt;

&lt;p&gt;Visit &lt;a href="https://copi.owasp.org" rel="noopener noreferrer"&gt;copi.owasp.org&lt;/a&gt; and play OWASP Cornucopia, Elevation of MLSec, Elevation of Privilege or OWASP Cumulus with your team.&lt;br&gt;
Games aren't just for fun, they can be serious tools too, and that is what we are doing with &lt;a href="https://cornucopia.owasp.org/" rel="noopener noreferrer"&gt;OWASP Cornucopia&lt;/a&gt;. We are making threat modeling for everyone, everywhere, and we have a special love for agile teams that want to do continuous threat modeling as part of their development sprints. Don't believe us? See how long-time project contributor Max Alejandro Gómez Sánchez Vergaray has &lt;a href="https://cornucopia.owasp.org/how-to-play#Gameplay-using-abuse-case-modelling-approach" rel="noopener noreferrer"&gt;created a video&lt;/a&gt; to explain how he has trained hundreds of teams to use OWASP Cornucopia in abuse case modelling sessions at a major international bank. This approach has scaled to over two-thousand developers to date.&lt;/p&gt;


&lt;h2&gt;
  
  
  

  &lt;iframe src="https://www.youtube.com/embed/vLYzId7-ijI"&gt;
  &lt;/iframe&gt;



&lt;/h2&gt;

&lt;p&gt;In our next version of OWASP Cornucopia Website App Edition version 2.2 we have a special treat for you. We have gathered together all our threat modeling expertise, created threat modeling scenarios for each card and analyzed which STRIDE categories each of these scenarios belong to. If you have bought a &lt;a href="https://cornucopia.owasp.org/webshop" rel="noopener noreferrer"&gt;OWASP Cornucopia deck with QR codes&lt;/a&gt; you can now give your team advice on threat scenarios, threat vectors, attack patterns, mitigation strategies and STRIDE when playing the game by letting them scan the QR codes on each card. Each scenario follows "&lt;a href="https://github.com/adamshostack/4QuestionFrame?tab=readme-ov-file#shostacks-four-question-frame-for-threat-modeling" rel="noopener noreferrer"&gt;Shostack's Four Question Frame for Threat Modeling&lt;/a&gt;" making it easy for your security champions to come up with the threats and mitigations themselves.&lt;br&gt;
In addition, we have added additional CAPECs that corresponds to each card and added references to the &lt;a href="https://devguide.owasp.org/en/04-design/02-web-app-checklist/" rel="noopener noreferrer"&gt;OWASP Developer Guide's Web Application Checklist&lt;/a&gt; that will link your threat modeling to OWASP secure coding practices and the &lt;a href="https://top10proactive.owasp.org/" rel="noopener noreferrer"&gt;OWASP Top 10 Proactive controls&lt;/a&gt;, this, thanks to Jon Gadson from the OWASP Developer Guide project.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjpj4qumpmfd2xt306hfb.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjpj4qumpmfd2xt306hfb.jpg" alt="Both the Mobile App Edition v1.1 and the Website App Edition v2.2 have QR codes that takes you to the OWASP Cornucopia Website for further analysis of threats and mitigations"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We are just getting started, in fact, this is just the first step. We will continue to bring threat modeling to everyone, everywhere, and will continue to do so in the time to come.&lt;br&gt;
Next time we will also talk about the last question: "Did we do a good job?"&lt;br&gt;
Why? Because we want the game to be used in iterative security processes that involves continually adapting security measures in cycles to identify, address, and reassess threats and vulnerabilities, making continuous improvements rather than a one-time fix.&lt;/p&gt;

&lt;p&gt;Stay tuned.&lt;/p&gt;
&lt;h2&gt;
  
  
  How to use OWASP Cornucopia cards together with the OWASP Cornucopia website
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;A - Preparations&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A1. Obtain a deck, or print your own Cornucopia deck and separate/cut out the cards&lt;/li&gt;
&lt;li&gt;A2. Identify an application or application process to review; this might be a concept, design or an actual implementation&lt;/li&gt;
&lt;li&gt;A3. Create a data flow diagram, user stories, or other artefacts to help the review&lt;/li&gt;
&lt;li&gt;A4. This will help answer the question: "What are we working on"&lt;/li&gt;
&lt;li&gt;A5. Identify and invite a group of 3-6 architects, developers, testers and other business stakeholders together and sit around a table (try to include someone fairly familiar with application security)&lt;/li&gt;
&lt;li&gt;A6. Have some prizes to hand (gold stars, chocolate, pizza, beer or flowers depending upon your office culture). See our "Prizes and Swags" section for ideas.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;B - Play&lt;br&gt;
One suit - Cornucopia - acts as trumps. Aces are high (i.e. they beat Kings). It helps if there is someone dedicated to documenting the results who is not playing.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;B1. Remove the Jokers and a few low-score (2, 3, 4) cards from Cornucopia suit to ensure each player will have the same number of cards&lt;/li&gt;
&lt;li&gt;B2. Shuffle the pack and deal all the cards&lt;/li&gt;
&lt;li&gt;B3. To begin, choose a player randomly who will play the first card - they can play any card from their hand except from the trump suit - Cornucopia&lt;/li&gt;
&lt;li&gt;B4. To play a card, each player must read it out aloud, and explain how (or not) the threat could apply (the player gets a point for attacks that work, and the group thinks it is an actionable bug) - don’t try to think of mitigations at this stage, and don’t exclude a threat just because it is believed it is already mitigated - someone record the card on the score sheet&lt;/li&gt;
&lt;li&gt;B5. B5. If a player get stuck, ask them to scan the QR code on the card to access the online card page and read the section called: &lt;strong&gt;"&lt;a href="https://cornucopia.owasp.org/cards/VE2#What-can-go-wrong?" rel="noopener noreferrer"&gt;What can go wrong?&lt;/a&gt;"&lt;/strong&gt; or click the "more info" links if playing &lt;a href="https://copi.owasp.org/" rel="noopener noreferrer"&gt;Copi&lt;/a&gt; (the online Cornucopia version) or just browse the card from the deck at cornucopia.owasp.org while playing&lt;/li&gt;
&lt;li&gt;B6. Play clockwise, each person must play a card in the same way; if you have any card of the matching lead suit you must play one of those, otherwise they can play a card from any other suit. Only a higher card of the same suit, or the trump suit Cornucopia, wins the hand&lt;/li&gt;
&lt;li&gt;B7. The person who wins the round, leads the next round (i.e. they play first), and thus defines the next lead suit&lt;/li&gt;
&lt;li&gt;B8. Repeat until all the cards are played&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;C - Scoring&lt;br&gt;
The objective is to identify applicable threats, and win hands (rounds)&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;C1. Score +1 for each card you can identify as a valid threat to the application under consideration&lt;/li&gt;
&lt;li&gt;C2. Score +1 if you win a round&lt;/li&gt;
&lt;li&gt;C3. Once all cards have been played, whoever has the most points, wins&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;D - Closure&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;D1. Review all the applicable threats and the matching security requirements.&lt;/li&gt;
&lt;li&gt;D2. Ask the group: "What are we going to do about it?". Use the QR codes on the physical cards or "more info" links if playing &lt;a href="https://copi.owasp.org/" rel="noopener noreferrer"&gt;Copi&lt;/a&gt; and read the &lt;strong&gt;&lt;a href="https://cornucopia.owasp.org/cards/VE2#What-are-we-going-to-do-about-it?" rel="noopener noreferrer"&gt;"What are we going to do about it?"&lt;/a&gt;&lt;/strong&gt; section&lt;/li&gt;
&lt;li&gt;D3. Create user stories, specifications and test cases as required for your development methodology and add them directly into your issue tracking software under the what you are working on&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Uncover the security flaws in your software's design before the bad guys do it for you! Get your team together on a call or in a room and use OWASP Cornucopia Web &amp;amp; Mobile, Elevation of Privilege or Elevation of MLSec and OWASP Cumulus to secure your AI models and Cloud infrastructure respectively and guide your threat modelling at &lt;a href="https://copi.owasp.org" rel="noopener noreferrer"&gt;copi.owasp.org&lt;/a&gt;, and if you visit our &lt;a href="https://github.com/OWASP/cornucopia" rel="noopener noreferrer"&gt;code repository&lt;/a&gt; please give us a star ⭐️.&lt;/p&gt;

&lt;p&gt;

  &lt;iframe src="https://www.youtube.com/embed/XXTPXozIHow"&gt;
  &lt;/iframe&gt;


&lt;/p&gt;




&lt;p&gt;&lt;a href="https://owasp.org" rel="noopener noreferrer"&gt;OWASP&lt;/a&gt; is a non-profit foundation that envisions a world with no more insecure software. Our mission is to be the global open community that powers secure software through education, tools, and collaboration. We maintain hundreds of open source projects, run industry-leading educational and training conferences, and meet through over 250 chapters worldwide.&lt;/p&gt;

</description>
      <category>devops</category>
      <category>security</category>
      <category>ai</category>
      <category>gamedev</category>
    </item>
    <item>
      <title>At OWASP Cornucopia we have long stated that we will create more decks, and now we will!</title>
      <dc:creator>Johan Sydseter</dc:creator>
      <pubDate>Thu, 07 Aug 2025 06:56:03 +0000</pubDate>
      <link>https://dev.to/sydseter/at-owasp-cornucopia-we-have-long-stated-that-we-will-create-more-decks-and-now-we-will-4488</link>
      <guid>https://dev.to/sydseter/at-owasp-cornucopia-we-have-long-stated-that-we-will-create-more-decks-and-now-we-will-4488</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/owasp/owasp-cornucopia-companion-edition-1h66" class="crayons-story__hidden-navigation-link"&gt;OWASP Cornucopia Companion Edition&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;
          &lt;a class="crayons-logo crayons-logo--l" href="/owasp"&gt;
            &lt;img alt="OWASP® Foundation logo" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3468%2F0b3561bb-9ac3-413f-baaa-5014181e4b4d.jpg" class="crayons-logo__image"&gt;
          &lt;/a&gt;

          &lt;a href="/sydseter" class="crayons-avatar  crayons-avatar--s absolute -right-2 -bottom-2 border-solid border-2 border-base-inverted  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1603787%2F2452403e-ca52-4d25-94f2-1170d6598a26.png" alt="sydseter profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/sydseter" class="crayons-story__secondary fw-medium m:hidden"&gt;
              johan sydseter
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                johan sydseter
                
              
              &lt;div id="story-author-preview-content-2755939" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/sydseter" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1603787%2F2452403e-ca52-4d25-94f2-1170d6598a26.png" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;johan sydseter&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

            &lt;span&gt;
              &lt;span class="crayons-story__tertiary fw-normal"&gt; for &lt;/span&gt;&lt;a href="/owasp" class="crayons-story__secondary fw-medium"&gt;OWASP® Foundation&lt;/a&gt;
            &lt;/span&gt;
          &lt;/div&gt;
          &lt;a href="https://dev.to/owasp/owasp-cornucopia-companion-edition-1h66" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Aug 6 '25&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/owasp/owasp-cornucopia-companion-edition-1h66" id="article-link-2755939"&gt;
          OWASP Cornucopia Companion Edition
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/appsec"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;appsec&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/cybersecurity"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;cybersecurity&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/gamedev"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;gamedev&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/security"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;security&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/owasp/owasp-cornucopia-companion-edition-1h66" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;3&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/owasp/owasp-cornucopia-companion-edition-1h66#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            2 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
      <category>appsec</category>
      <category>cybersecurity</category>
      <category>gamedev</category>
      <category>security</category>
    </item>
    <item>
      <title>OWASP Cornucopia Companion Edition</title>
      <dc:creator>Johan Sydseter</dc:creator>
      <pubDate>Wed, 06 Aug 2025 14:35:30 +0000</pubDate>
      <link>https://dev.to/owasp/owasp-cornucopia-companion-edition-1h66</link>
      <guid>https://dev.to/owasp/owasp-cornucopia-companion-edition-1h66</guid>
      <description>&lt;h2&gt;
  
  
  &lt;em&gt;At OWASP Cornucopia we have long stated that we will create more decks, and now we will!&lt;/em&gt;
&lt;/h2&gt;

&lt;p&gt;To provide more possibilities for doing threat modeling while playing games, OWASP Cornucopia would like to welcome all OWASP members and OWASP Cornucopia enthusiasts to create the OWASP Cornucopia companion deck!&lt;/p&gt;

&lt;p&gt;The companion deck will contain a number of optional card enhancements - each one a single suit covering a particular application security topic, and intended to be used in conjunction with the existing OWASP Cornucopia Website Edition. A suit in the companion deck may be used to replace a suit in the existing Website Edition, so that the players can add a specific focus for their threat modeling.&lt;/p&gt;

&lt;p&gt;For example, say you are building an IoT application and want to perform threat modeling specifically for IoT. If that is the case, you can use the OWASP Cornucopia Website Edition together with the IoT companion suit as your elected OWASP Cornucopia focus area.&lt;/p&gt;

&lt;p&gt;Each of the attacks on the cards belonging to the various suits will showcase AppSec requirements from different OWASP projects and beyond, commemorating and celebrating the 25th anniversary of the OWASP Foundation next year. In addition, we would like the case, the leaflet with the instructions, and the face of the cards to be illustrated for this very same purpose.&lt;/p&gt;

&lt;p&gt;Join us to take gamified threat modeling to the next level and celebrate the OWASP Foundation's achievements within application security worldwide. We welcome suggestions on what the focus areas of the extension suits in the companion deck should be, which OWASP projects are most relevant for these, and contributors to write the attacks for each card. We are thinking of up to six companion deck suits. Get in touch….&lt;/p&gt;

&lt;p&gt;Github: &lt;a href="https://github.com/OWASP/cornucopia/discussions/1548" rel="noopener noreferrer"&gt;https://github.com/OWASP/cornucopia/discussions/1548&lt;/a&gt;&lt;br&gt;
Linkedin: &lt;a href="https://www.linkedin.com/in/sydseter/" rel="noopener noreferrer"&gt;https://www.linkedin.com/in/sydseter/&lt;/a&gt;&lt;br&gt;
Bluesky: &lt;a href="https://bsky.app/profile/sydseter.com" rel="noopener noreferrer"&gt;https://bsky.app/profile/sydseter.com&lt;/a&gt;&lt;br&gt;
Mastodon: &lt;a href="https://mastodon.social/@sydseter" rel="noopener noreferrer"&gt;https://mastodon.social/@sydseter&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;Learn how to play OWASP Cornucopia or Elevation of Privilege:&lt;/p&gt;

&lt;p&gt;  &lt;iframe src="https://www.youtube.com/embed/XXTPXozIHow"&gt;
  &lt;/iframe&gt;
&lt;/p&gt;




&lt;p&gt;&lt;a href="https://owasp.org" rel="noopener noreferrer"&gt;OWASP&lt;/a&gt; is a non-profit foundation that envisions a world with no more insecure software. Our mission is to be the global open community that powers secure software through education, tools, and collaboration. We maintain hundreds of open source projects, run industry-leading educational and training conferences, and meet through over 250 chapters worldwide.&lt;/p&gt;

</description>
      <category>appsec</category>
      <category>cybersecurity</category>
      <category>gamedev</category>
      <category>security</category>
    </item>
    <item>
      <title>No need to fear the clouds. Play OWASP Cumulus!</title>
      <dc:creator>Johan Sydseter</dc:creator>
      <pubDate>Thu, 26 Jun 2025 09:32:39 +0000</pubDate>
      <link>https://dev.to/owasp/no-need-to-fear-the-clouds-play-owasp-cumulus-d6g</link>
      <guid>https://dev.to/owasp/no-need-to-fear-the-clouds-play-owasp-cumulus-d6g</guid>
      <description>&lt;h2&gt;
  
  
  &lt;em&gt;The clouds can be a scary place. All these machines that simply aren't yours. So, how can you make sure you continuously keep your cloud infrastructure secure? OWASP Cumulus is the easy way to bring security into the cloud and your DevOps teams. Play it at &lt;a href="https://copi.owasp.org" rel="noopener noreferrer"&gt;copi.owasp.org&lt;/a&gt; thanks to &lt;a href="https://www.linkedin.com/in/christoph-niehoff-43020b20b/" rel="noopener noreferrer"&gt;Christoph Niehoff&lt;/a&gt; and &lt;a href="https://owasp.org/www-project-cumulus/" rel="noopener noreferrer"&gt;OWASP Cumulus&lt;/a&gt;!&lt;/em&gt;
&lt;/h2&gt;

&lt;p&gt;As a variant of the card game &lt;a href="https://shostack.org/games/elevation-of-privilege" rel="noopener noreferrer"&gt;Elevation of Privilege&lt;/a&gt; it follows the idea to threat model a system via gamification. This lightweight and low-barrier approach helps you find threats to your DevOps or cloud project and teaches the developers a security oriented mindset.&lt;/p&gt;

&lt;h2&gt;
  
  
  Threat Modeling
&lt;/h2&gt;

&lt;p&gt;The idea of threat modeling via serious games goes back to the card game &lt;a href="https://shostack.org/games/elevation-of-privilege" rel="noopener noreferrer"&gt;Elevation of Privilege&lt;/a&gt; by Adam Shostack. The basic idea is to bring the developers to the table and get them start discussing the security of their system. For this, a card game serves as a guide through a catalogue of threats. It is designed to be low-barrier and naturally embeddable within agile development processes.&lt;/p&gt;

&lt;p&gt;While we at &lt;a href="https://cornucopia.owasp.org/" rel="noopener noreferrer"&gt;OWASP Cornucopia&lt;/a&gt; have been focusing on creating games focused on web- and mobile application security, we have felt that the specific needs of the DevOps team working in cloud environments have been missing. &lt;a href="https://owasp.org/www-project-cumulus/" rel="noopener noreferrer"&gt;OWASP Cumulus&lt;/a&gt; seeks to fill this gap and provides a custom card deck with threats to cloud systems.&lt;/p&gt;

&lt;h2&gt;
  
  
  Continuously Assessing your Security
&lt;/h2&gt;

&lt;p&gt;The point here is not do just do your initial security risk assessment and be done with it, but to continuously look for new threats on a regular basis as you expand your infrastructure according to the &lt;a href="https://www.threatmodelingmanifesto.org/" rel="noopener noreferrer"&gt;Threat Modeling Manifesto&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;"Continuous Threat Modeling", a term described in &lt;a href="https://www.amazon.com/Threat-Modeling-Identification-Avoidance-Secure/dp/1492056553" rel="noopener noreferrer"&gt;"Threat Modeling: A Practical Guide for Development Teams"&lt;/a&gt; by Izar Tarandach &amp;amp; Matthew J. Coles is essential to keep your applications and infrastructure secure as you expand your system with new features and machines and increase the attack surface. Gamifications can help getting started doing just that. So why would you want to continuous threat model your infrastructure and applications? Isn't it enough just to do a thorough and deep check up now and then? At &lt;a href="https://admincontrol.com/" rel="noopener noreferrer"&gt;Admincontrol&lt;/a&gt;, where I work, we thought so as well!&lt;/p&gt;

&lt;p&gt;At Admincontrol, we where using threat modeling to threat model our applications. We have been having a large session that we only are able to do once a year, and several smaller sessions that we do for each sprint. We define Jira issues meant for mitigating these threats and assign them directly to the development team's backlog. Then we have security backlog grooming once a month with the product owners and discuss directly with them how we can get these issues resolved.&lt;/p&gt;

&lt;p&gt;The first graph shows the resolution time for the Jira issues that are created based on the threat modeling session we do once a year. The second graph shows the resolution graph for Jira issues for the threat modeling that we do each sprint.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Graph 1&lt;/strong&gt;:&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj4s1t7qyv02vmkpt5v4w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj4s1t7qyv02vmkpt5v4w.png" alt="Threat modeling done once a year"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Graph 2&lt;/strong&gt;:&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fskzqjk9cd1ubnjj2kh6h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fskzqjk9cd1ubnjj2kh6h.png" alt="Threat modeling done continously"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As you can see, in the first graph, the resolution time is just increasing. This is because we have Jira issues that are defined but never resolved. Some of the issues have taken close to 3 years to resolve!&lt;/p&gt;

&lt;p&gt;The second graph shows a bump where the resolution time spikes. This is because we had a component that didn't get finalized. It stayed on the drawing bord, but the threat modeling was done so the resolution time spiked. We have no data before 2023 as we didn't do this type of threat modeling before 2023. On average, the resolution time for the short threat modeling sessions is ca. 3 months. This usually coincides with the frequency of our minor releases that contains new features.&lt;/p&gt;
&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Femdxojidbn7pkgz2uqyu.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Femdxojidbn7pkgz2uqyu.jpg" alt=" "&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you do long and large sessions, you run the risk of both doing threat modeling irregularly, meaning that you will have issues you never are able to solve, and having issues meant to improve the security staying in the development team's backlog forever, never to see the light of day. If you think that technical debt is scary, wait until you get to see your security debt. Not assessing how your security is doing on a regular basis isn't only very expensive, it can leave you open for threats as well. This is why &lt;a href="https://github.com/izar/continuous-threat-modeling" rel="noopener noreferrer"&gt;continuous threat modeling&lt;/a&gt; is so important. Don't let your business spiral out of control, consciously assess how you are doing by continuously threat model your applications and infrastructure.&lt;/p&gt;
&lt;h2&gt;
  
  
  How to play OWASP Cumulus
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Go to: &lt;a href="https://copi.owasp.org/games/new" rel="noopener noreferrer"&gt;https://copi.owasp.org/games/new&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Select OWASP Cumulus from the drop-down list&lt;/li&gt;
&lt;li&gt;Make sure you have done all the preparations&lt;/li&gt;
&lt;li&gt;Then click: Create the Game &lt;/li&gt;
&lt;li&gt;Send the link to 3 players&lt;/li&gt;
&lt;li&gt;Once 3 players have join, click start the game.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8luferag2unn4kdmrolu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8luferag2unn4kdmrolu.png" alt="owasp cumulus how to"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhhwbwjn0k71ny8oazlj8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhhwbwjn0k71ny8oazlj8.png" alt="the cards"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  OWASP Cornucopia
&lt;/h2&gt;

&lt;p&gt;Uncover the security flaws in your software's design before the bad guys do it for you! Get your team together on a call or in a room and use OWASP Cornucopia Web &amp;amp; Mobile, Elevation of Privilege or Elevation of MLSec and OWASP Cumulus to secure your AI models and Cloud infrastructure respectively and guide your threat modelling at &lt;a href="https://copi.owasp.org" rel="noopener noreferrer"&gt;copi.owasp.org&lt;/a&gt;, and if you visit our &lt;a href="https://github.com/OWASP/cornucopia" rel="noopener noreferrer"&gt;code repository&lt;/a&gt; please give us a star ⭐️.&lt;/p&gt;



&lt;p&gt;Learn how to play OWASP Cornucopia or Elevation of Privilege:&lt;/p&gt;

&lt;p&gt;  &lt;iframe src="https://www.youtube.com/embed/XXTPXozIHow"&gt;
  &lt;/iframe&gt;
&lt;/p&gt;




&lt;p&gt;&lt;a href="https://owasp.org" rel="noopener noreferrer"&gt;OWASP&lt;/a&gt; is a non-profit foundation that envisions a world with no more insecure software. Our mission is to be the global open community that powers secure software through education, tools, and collaboration. We maintain hundreds of open source projects, run industry-leading educational and training conferences, and meet through over 250 chapters worldwide.&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>threatmodeling</category>
      <category>appsec</category>
      <category>gamedev</category>
    </item>
    <item>
      <title>Are you letting the AI do the threat modeling?</title>
      <dc:creator>Johan Sydseter</dc:creator>
      <pubDate>Tue, 17 Jun 2025 13:14:26 +0000</pubDate>
      <link>https://dev.to/sydseter/are-you-letting-the-ai-do-the-threat-modeling-18o0</link>
      <guid>https://dev.to/sydseter/are-you-letting-the-ai-do-the-threat-modeling-18o0</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/owasp/threat-modeling-your-ai-models-using-ai-29e1" class="crayons-story__hidden-navigation-link"&gt;Does the AI do the threat modeling of your software?&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;
          &lt;a class="crayons-logo crayons-logo--l" href="/owasp"&gt;
            &lt;img alt="OWASP® Foundation logo" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3468%2F0b3561bb-9ac3-413f-baaa-5014181e4b4d.jpg" class="crayons-logo__image"&gt;
          &lt;/a&gt;

          &lt;a href="/sydseter" class="crayons-avatar  crayons-avatar--s absolute -right-2 -bottom-2 border-solid border-2 border-base-inverted  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1603787%2F2452403e-ca52-4d25-94f2-1170d6598a26.png" alt="sydseter profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/sydseter" class="crayons-story__secondary fw-medium m:hidden"&gt;
              johan sydseter
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                johan sydseter
                
              
              &lt;div id="story-author-preview-content-2584671" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/sydseter" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1603787%2F2452403e-ca52-4d25-94f2-1170d6598a26.png" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;johan sydseter&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

            &lt;span&gt;
              &lt;span class="crayons-story__tertiary fw-normal"&gt; for &lt;/span&gt;&lt;a href="/owasp" class="crayons-story__secondary fw-medium"&gt;OWASP® Foundation&lt;/a&gt;
            &lt;/span&gt;
          &lt;/div&gt;
          &lt;a href="https://dev.to/owasp/threat-modeling-your-ai-models-using-ai-29e1" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Jun 11 '25&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/owasp/threat-modeling-your-ai-models-using-ai-29e1" id="article-link-2584671"&gt;
          Does the AI do the threat modeling of your software?
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/ai"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;ai&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/threatmodeling"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;threatmodeling&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/appsec"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;appsec&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/openai"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;openai&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
            &lt;a href="https://dev.to/owasp/threat-modeling-your-ai-models-using-ai-29e1#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            3 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
      <category>ai</category>
      <category>threatmodeling</category>
      <category>appsec</category>
      <category>openai</category>
    </item>
    <item>
      <title>Version 2.3 of OWASP Cornucopia has been released!</title>
      <dc:creator>Johan Sydseter</dc:creator>
      <pubDate>Wed, 11 Jun 2025 19:35:33 +0000</pubDate>
      <link>https://dev.to/sydseter/version-23-of-owasp-cornucopia-has-been-released-11kl</link>
      <guid>https://dev.to/sydseter/version-23-of-owasp-cornucopia-has-been-released-11kl</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/owasp/threat-modeling-your-ai-models-using-ai-29e1" class="crayons-story__hidden-navigation-link"&gt;Does the AI do the threat modeling of your software?&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;
          &lt;a class="crayons-logo crayons-logo--l" href="/owasp"&gt;
            &lt;img alt="OWASP® Foundation logo" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F3468%2F0b3561bb-9ac3-413f-baaa-5014181e4b4d.jpg" class="crayons-logo__image"&gt;
          &lt;/a&gt;

          &lt;a href="/sydseter" class="crayons-avatar  crayons-avatar--s absolute -right-2 -bottom-2 border-solid border-2 border-base-inverted  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1603787%2F2452403e-ca52-4d25-94f2-1170d6598a26.png" alt="sydseter profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/sydseter" class="crayons-story__secondary fw-medium m:hidden"&gt;
              johan sydseter
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                johan sydseter
                
              
              &lt;div id="story-author-preview-content-2584671" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/sydseter" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1603787%2F2452403e-ca52-4d25-94f2-1170d6598a26.png" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;johan sydseter&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

            &lt;span&gt;
              &lt;span class="crayons-story__tertiary fw-normal"&gt; for &lt;/span&gt;&lt;a href="/owasp" class="crayons-story__secondary fw-medium"&gt;OWASP® Foundation&lt;/a&gt;
            &lt;/span&gt;
          &lt;/div&gt;
          &lt;a href="https://dev.to/owasp/threat-modeling-your-ai-models-using-ai-29e1" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Jun 11 '25&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/owasp/threat-modeling-your-ai-models-using-ai-29e1" id="article-link-2584671"&gt;
          Does the AI do the threat modeling of your software?
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/ai"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;ai&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/threatmodeling"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;threatmodeling&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/appsec"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;appsec&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/openai"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;openai&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
            &lt;a href="https://dev.to/owasp/threat-modeling-your-ai-models-using-ai-29e1#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            3 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
      <category>ai</category>
      <category>threatmodeling</category>
      <category>appsec</category>
      <category>openai</category>
    </item>
  </channel>
</rss>
